Anomaly detection is still a difficult task. To address this problem, we propose to strengthen DBSCAN algorithm for the data by converting all data to the graph concept frame (CFG). As is well known that the work DBSCAN method used to compile the data set belong to the same species in a while it will be considered in the external behavior of the cluster as a noise or anomalies. It can detect anomalies by DBSCAN algorithm can detect abnormal points that are far from certain set threshold (extremism). However, the abnormalities are not those cases, abnormal and unusual or far from a specific group, There is a type of data that is do not happen repeatedly, but are considered abnormal for the group of known. The analysis showed DBSCAN using the
... Show MoreMissing data is one of the problems that may occur in regression models. This problem is usually handled by deletion mechanism available in statistical software. This method reduces statistical inference values because deletion affects sample size. In this paper, Expectation Maximization algorithm (EM), Multicycle-Expectation-Conditional Maximization algorithm (MC-ECM), Expectation-Conditional Maximization Either (ECME), and Recurrent Neural Networks (RNN) are used to estimate multiple regression models when explanatory variables have some missing values. Experimental dataset were generated using Visual Basic programming language with missing values of explanatory variables according to a missing mechanism at random general pattern and s
... Show MoreCloud computing has gained considerable attention in academia and industry in recent years. The cloud facilitates data sharing and enables cost efficiency, thus playing a vital role today as well as for the foreseeable future. In this paper, a brief discussion the application of multi-tenant and load-balancing technologies to cloud-based digital resource sharing suitable for academic and digital libraries is presented. As a new paradigm for digital resource sharing, a proposal of improving the current user service model with private cloud storage for other sectors, including the medical and financial fields is offered. This paper gives a summary of cloud computing and its possible applications, combined with digital data optim
... Show MoreInformation centric networking (ICN) is the next generation of internet architecture with its ability to provide in-network caching that make users retrieve their data efficiently regardless of their location. In ICN, security is applied to data itself rather than communication channels or devices. In-network caches are vulnerable to many types of attacks, such as cache poisoning attacks, cache privacy attacks, and cache pollution attacks (CPA). An attacker floods non-popular content to the network and makes the caches evict popular ones. As a result, the cache hit ratio for legitimate users will suffer from a performance degradation and an increase in the content’s retrieval latency. In this paper, a popularity variation me
... Show MoreDiscrete logarithms are applied in many cryptographic problems . For instance , in public key . and for construction of sets with disti nct sums of k-clcments. The purpose o r this paper
is to modify the method ol' informationl1·iding using discrete logarithms , introduce new properties of St - sets , uscdthe direct product of groups to construct cyclic group and finally, present modified method for knapsack &
... Show MoreSummarized the idea of research is marked by "changes in the process of mass communication by using the international network of information" by specifying what data networking and mass communication is the transformation processes in the mass communication network where research aims to:1. Diagnostic data and transformations in the process of mass communication network.2. Provide a contact form commensurate with the characteristic mass of the International Network of electronic information, and research found to provide a communicative model called the (human contact network). In short (HCN) Humanity Communication Net also reached conclusions concerning the search process and communicative transformations and changes that have taken pla
... Show MoreThe study aims to display the scientific benefit offered by modern electronic programs for various scientific research methods, while determining the positive scientific role played by these programs in modernizing the methodologies and logic of scientific thinking, especially with the rapid development of the sciences and their curricula.
These programs link accurately with scientific results. The importance of the study is to provide practical mechanisms to highlight the scientific projection of the electronic programs in various steps of scientific research.
A case study was used for Tropes version 8.4, which analyzes written, audio and visual semantic texts and presents a set of statistical results that facilitate the difficult
The research aims to introduce international valuation standards and to identify the relationship between international valuation standards and international accounting and financial reporting standards in enhancing the quality of financial reporting (appropriate accounting information) through the use of statistical models for the purpose of measuring the property of appropriateness of accounting information through the use of statistical models for the purpose of proving the hypothesis that The research referred to it, and accordingly, the Francis and Kothari models were used to measure the appropriateness of accounting information (the quality of the information). The conclusions reached by the two researchers is that the sett
... Show MoreIn this paper, the Adomian decomposition method (ADM) is successfully applied to find the approximate solutions for the system of fuzzy Fredholm integral equations (SFFIEs) and we also study the convergence of the technique. A consistent way to reduce the size of the computation is given to reach the exact solution. One of the best methods adopted to determine the behavior of the approximate solutions. Finally, the problems that have been addressed confirm the validity of the method applied in this research using a comparison by combining numerical methods such as the Trapezoidal rule and Simpson rule with ADM.